Black Arrow Cyber Threat Intelligence Briefing 09 January 2025

Welcome to this week’s Black Arrow Cyber Threat Intelligence Briefing – a weekly digest, collated and curated by our cyber experts to provide senior and middle management with an easy to digest round up of the most notable threats, vulnerabilities, and cyber related news from the last week.

Executive Summary

This week’s review of cyber security insights in the specialist and general media includes a look back at 2025 and a look forward to 2026, with recommended focus areas for business leaders. Last year saw an increase in attacks and a greater focus on gaining entry through employees and third parties, and exploiting insufficient controls around access management.

The escalation in risks requires business leaders in 2026 to test their resilience to a cyber attack through rehearsals of the incident response plan. From experience of running many simulations with clients across the world, we strongly recommend the rehearsal should be led by an impartial cyber and business expert to take you and your control providers, including IT, into ‘what if’ scenarios that help to flush out assumptions.

This week, we also include news on attack campaigns for you to be aware of, including fake DocuSign emails and the continued attacks on organisations that rely only on passwords to secure access.

Contact us to discuss how to reflect our threat intelligence briefing in your approach to cyber security, in an impartial and proportionate manner.


Top Cyber Stories of the Last Week

2025 Proved Hackers Aren’t Slowing Down – and Neither Should You

Cyber activity intensified in 2025, with ransomware, espionage, cryptomining and infostealers hitting manufacturing, aerospace and critical infrastructure. Attackers are moving beyond passwords to session token theft, exploiting non-human identities and AI-driven social engineering. The Jaguar Land Rover incident shows third-party compromise can cripple operations. Business leaders should prioritise a Zero Trust model, and encourage staff to pause before clicking and to verify urgent requests before acting.

Source: https://www.phonearena.com/news/2025-proved-hackers-arent-slowing-down-neither-should-you_id177153

Ransomware Attacks Kept Climbing in 2025 as Gangs Refused to Stay Dead

Ransomware victim numbers rose sharply in 2025, with thousands of organisations named on extortion sites. Law enforcement disrupted several major groups, but attackers quickly re-emerged under new brands and affiliations. Entry points increasingly involve social engineering and stolen credentials rather than technical exploits, keeping barriers to entry low. To address this, organisations should prioritise protecting credentials, staff vigilance, and testing recovery plans, recognising that law enforcement action rarely eliminates the threat of attack.

Source: https://www.theregister.com/2026/01/08/ransomware_2025_emsisoft/

Phishing Kits Soared in Popularity Last Year as Rookie Hackers Ramped Up DIY Cyber Attacks

Phishing kits are making large-scale attacks easier, with most high-volume campaigns relying on pre-built tools that support MFA bypass and evasion. QR codes and obfuscated links are increasingly used to avoid detection, enabling less skilled attackers to run sophisticated campaigns. Business leaders should focus on strengthening access controls and authentication, reducing link-clicking behaviour, and ensuring staff recognise QR and MFA-bypass lures as part of routine security awareness.

Source: https://www.itpro.com/security/phishing/phishing-as-a-service-kits-growth-2025-barracuda

Cyber Risk Trends for 2026: Building Resilience, Not Just Defences

Cyber risk in 2026 is shaped by increasingly automated, persistent and intelligent attacks; this requires business leaders to shift their focus to resilience across governance, operations, technology and people. Key pressures include AI-driven social engineering, third-party dependencies, uncertainty around quantum computing risks and geopolitical instability. Priorities include ensuring recovery readiness and clear ownership, strengthening how identity and access are managed, and rehearsing incident response that measures success by time to detect, contain and recover.

Source: https://www.securityweek.com/cyber-risk-trends-for-2026-building-resilience-not-just-defenses/

Cyber Risk in 2026: How Geopolitics, Supply Chains and Shadow AI Will Test Resilience

Geopolitical friction will amplify cyber risk in 2026 due to shifting alliances and sanctions. Employee use of AI tools that are not within the remit of the organisation’s security controls adds unmanaged risks to vulnerability management, incident response and resilience processes. Maritime logistics is a prime target, with resilient shipping relying on real-time monitoring and intelligence-led risk exposure management. Business leaders should embed AI governance and geopolitical awareness into risk planning.

Source: https://www.infosecurity-magazine.com/opinions/geopolitics-supply-chains-shadow/

Average Cyberattack Cost Hits $2.5M as Recovery Lags

A survey of 750 CISOs across the US and UK shows recovery is taking longer and costing more, with average recovery costs at $2.5M. Many organisations face days of downtime and some up to weeks. Fewer organisations now have formal cyber resilience strategies, yet boards still expect zero breaches. Leadership responses include resetting expectations, prioritising rapid recovery, and reducing time to restore operations rather than relying solely on prevention.

Source: https://www.telecomstechnews.com/news/average-cyberattack-cost-hits-2-5m-as-recovery-lags/

New Phishing Attack Impersonate as DocuSign Deploys Stealthy Malware on Windows Systems

Attackers are using fake DocuSign emails to trick staff into launching malware on Windows devices. The campaign is designed to evade common security checks and can run without obvious warning signs. Organisations should confirm their endpoint protections can detect malicious activity triggered through email links or attachments, and ensure staff treat unexpected document-signing requests with caution and verify requests via trusted channels.

Source: https://cybersecuritynews.com/new-phishing-attack-impersonate-as-docusign/

Phishers Exploit Office 365 Users Who Let Their Guard Down

Phishing attacks are increasingly exploiting misconfigured Office 365 tenants allowing attackers to spoof trusted domains and route messages in ways that evade controls. In October 2025 alone, Microsoft reported blocking over 13 million MFA-bypass phishing emails linked to an attack campaign known as Tycoon2FA. To reduce risks, ensure tenant email authentication controls are correctly configured, prioritise phishing-resistant MFA, and treat email-based password resets as a high-risk process.

Source: https://www.darkreading.com/cloud-security/phishers-exploit-office-365-users-guard-down

Dozens of Organisations Fall Victim to Infostealers After Failing to Enforce MFA

Fifty global organisations were compromised after relying on passwords alone to access cloud systems. Attackers used infostealers to harvest stored credentials, including some that were years old, and accessed cloud platforms and exfiltrated large volumes of data, including a reported 139GB from one firm. Business leaders should ensure MFA is enforced for cloud access, reduce reuse of old credentials, and monitor access logs and unusual downloads.

Source: https://www.techradar.com/pro/security/dozens-of-organizations-fall-victim-to-infostealers-after-failing-to-enforce-mfa



Threats

Ransomware, Extortion and Destructive Attacks

Inside the Cyber Extortion Boom: Phishing Gangs and Crime-as-a-Service - Infosecurity Magazine

New ransomware tactics to watch out for in 2026

Ransomware on the rise: why mid-market firms are in the crosshairs - Raconteur

The Big Risks for ’26 – Resilience key in navigating cyber landscape

Two cybersecurity experts plead guilty to running ransomware operation | CSO Online

Hackers Trapped in Resecurity’s Honeypot During Targeted Attack on Employee Network

Ransomware Victims

Ransomware Hits a Claims Giant: What the Sedgwick Breach Reveals About Modern Extortion Attacks - Security Boulevard

Cyberattack slams Jaguar Land Rover sales| Cybernews

Everest claims large insurance platform Bolttech | Cybernews

Nuneaton school reopening delayed to next week after cyber attack - BBC News

Sedgwick discloses data breach after TridentLocker ransomware attack

Jaguar Land Rover sales slump sharply amid US tariffs and cyber-attack

Cressi diving gear allegedly breached by hackers | Cybernews

Covenant Health data breach after ransomware attack impacted over 478,000 people

Phishing & Email Based Attacks

Phishers Exploit Office 365 Users Who Let Their Guard Down

Inside the Cyber Extortion Boom: Phishing Gangs and Crime-as-a-Service - Infosecurity Magazine

Phishing-as-a-service kits doubled in 2025 as tactics evolve - BetaNews

International Threats: Themes for Regional Phishing Campaigns - Security Boulevard

New Phishing Attack Impersonate as DocuSign Deploys Stealthy Malware on Windows Systems

Microsoft sends warning over new type of phishing attack | Cybernews

Cybercriminals Abuse Google Cloud Email Feature in Multi-Stage Phishing Campaign

Phishing campaign abuses Google Cloud services to steal Microsoft 365 logins | Malwarebytes

This phishing campaign spoofs internal messages - here's what we know | TechRadar

Cybercriminals use HTML to hide QR code phishing | Cybernews

Phishing kits soared in popularity last year as rookie hackers ramped up DIY cyber attacks | IT Pro

What the Year’s Biggest Phishing Scams Reveal

Pornhub tells users to expect sextortion emails after data exposure | Malwarebytes

Phishing actors exploit complex routing and misconfigurations to spoof domains | Microsoft Security Blog

Hackers target Booking.com users | Cybernews

Email-first cybersecurity predictions for 2026 - Security Boulevard

Fake emails target Cardano users with remote access malware

Other Social Engineering

Hackers target Booking.com users | Cybernews

ClickFix attack uses fake Windows BSOD screens to push malware

Pornhub tells users to expect sextortion emails after data exposure | Malwarebytes

Voice cloning defenses are easier to undo than expected - Help Net Security

I Talked to Cybersecurity Experts After These LinkedIn Scams Almost Fooled Me - CNET

Russian hackers target European hospitality industry with ‘blue screen of death’ malware | The Record from Recorded Future News

Fraud, Scams and Financial Crime

Why governments need to treat fraud like cyberwarfare, not customer service | CyberScoop

Digital wallet fraud: how your bank card can be stolen without it leaving your wallet | Banks and building societies | The Guardian

What the Year’s Biggest Phishing Scams Reveal

FCC finalizes new penalties for robocall violators | CyberScoop

A quarter of a billion spam numbers have been logged - and nuisance calls just keep increasing, despite government crackdown | The Independent

Artificial Intelligence

Cyber Risk In 2026: How Geopolitics, Supply Chains and Shadow AI Will Test Resilience - Infosecurity Magazine

AI security risks are also cultural and developmental - Help Net Security

AI, Quantum, and the New Threat Frontier: What Will Define Cybersecurity in 2026? - Security Boulevard

When AI agents interact, risk can emerge without warning - Help Net Security

In 2026, Hackers Want AI: Threat Intel on Vibe Hacking & HackGPT

Security Experts Dire Warning on AI Agents in 2026

Yes, criminals are using AI to vibe-code malware • The Register

Voice cloning defenses are easier to undo than expected - Help Net Security

EU plans new AI data rules, privacy at risk| Cybernews

Europe looks to AI resilience amid growing risk

NIST Releases Preliminary Draft Cyber AI Profile

AI agents 2026's biggest insider threat: PANW security boss • The Register

Agentic AI Is an Identity Problem and CISOs Will Be Accountable for the Outcome

Two Chrome Extensions Caught Stealing ChatGPT and DeepSeek Chats from 900,000 Users

ChatGPT's Memory Feature Supercharges Prompt Injection

New Zero-Click Attack Lets ChatGPT User Steal Data - Infosecurity Magazine

Legacy IAM was built for humans — and AI agents now outnumber them 82 to 1 | VentureBeat

Identity becomes the 2026 battleground as AI erases trust signals | SC Media

China moves to rein in 'anthropomorphic' AI chatbots

Government demands Musk's X deals with 'appalling' Grok AI - BBC News

‘Elon Musk is playing with fire:’ All the legal risks that apply to Grok’s deepfake disaster | CyberScoop

UK regulators swarm X after Grok generated nudes from photos • The Register

2FA/MFA

One criminal stole info from 50 orgs thanks to no MFA • The Register

Dozens of Major Data Breaches Linked to Single Threat Actor - SecurityWeek

Over 10K Fortinet firewalls exposed to actively exploited 2FA bypass

Malware

Dozens of organizations fall victim to infostealers after failing to enforce MFA | TechRadar

Dozens of Major Data Breaches Linked to Single Threat Actor - SecurityWeek

New Phishing Attack Impersonate as DocuSign Deploys Stealthy Malware on Windows Systems

2.2M Chrome, Firefox, Edge users impacted by meeting-stealing malware​ | Cybernews

Infostealers Enable Attackers to Hijack Legitimate Business Infrastructure for Malware Hosting

Yes, criminals are using AI to vibe-code malware • The Register

Versatile Malware Loader pkr_mtsi Delivers Diverse Payloads - Infosecurity Magazine

Hackers target Booking.com users | Cybernews

ClickFix attack uses fake Windows BSOD screens to push malware

How attackers are weaponizing open-source package managers [Q&A] - BetaNews

GoBruteforcer Botnet Targets Linux Servers - Infosecurity Magazine

Fake emails target Cardano users with remote access malware

New VVS Stealer Malware Targets Discord Accounts via Obfuscated Python Code

Russia-linked APT UAC-0184 uses Viber to spy on Ukrainian military in 2025

Who Benefited from the Aisuru and Kimwolf Botnets? – Krebs on Security

Astaroth banking Trojan spreads in Brazil via WhatsApp worm

Bots/Botnets

The Kimwolf Botnet is Stalking Your Local Network – Krebs on Security

Kimwolf Botnet Hacked 2 Million Devices and Turned User’s Internet Connection as Proxy Node

GoBruteforcer Botnet Targets Linux Servers - Infosecurity Magazine

Who Benefited from the Aisuru and Kimwolf Botnets? – Krebs on Security

Mobile

Digital wallet fraud: how your bank card can be stolen without it leaving your wallet | Banks and building societies | The Guardian

Google fixes critical Dolby Decoder bug in Android January update

HSBC blocks app users for having sideloaded password manager • The Register

Do Smartphone Apps Spy On Your Contacts?

Denial of Service/DoS/DDoS

5 myths about DDoS attacks and protection | CSO Online

New ransomware tactics to watch out for in 2026

Internet of Things – IoT

When the Cloud Rains on Everyone's IoT Parade

Hundreds of British buses have Chinese ‘kill switch’

Data Breaches/Leaks

Experts Trace $35m in Stolen Crypto to LastPass Breach - Infosecurity Magazine

Hackers Allegedly Steal Access Tokens, Confidential Documents From European Space Agency

Hackers claim to hack Resecurity, firm says it was a honeypot

Cybercrook claims to sell critical info about utilities • The Register

NordVPN denies breach claims, says attackers have "dummy data"

Manage My Health hack: New Zealand's worst cybersecurity incidents | RNZ News

Brightspeed investigates breach as crims post data for sale • The Register

More than 100,000 households warned after cyber attack on Kensington and Chelsea Council | The Independent

Covenant Health data breach after ransomware attack impacted over 478,000 people

Leak exposes Knownsec’s role in state cyber targeting | Cybernews

Organised Crime & Criminal Actors

Inside the Cyber Extortion Boom: Phishing Gangs and Crime-as-a-Service - Infosecurity Magazine

In 2026, Hackers Want AI: Threat Intel on Vibe Hacking & HackGPT

Billion-dollar Bitcoin hacker Ilya Lichtenstein thanks Trump for early prison release | The Verge

Alleged cybercrime kingpin arrested and extradited to China, Cambodia says | CNN

Cryptocurrency/Cryptomining/Cryptojacking/NFTs/Blockchain

Experts Trace $35m in Stolen Crypto to LastPass Breach - Infosecurity Magazine

Crypto wallet firm Ledger faces new data breach through Global-e partner

Billion-dollar Bitcoin hacker Ilya Lichtenstein thanks Trump for early prison release | The Verge

Coinbase insider who sold customer data to criminals arrested in India

Illegal crypto dealings hit $154B amid surge in state-sponsored threats - Chainalysis report - Cryptopolitan

Fake emails target Cardano users with remote access malware

Insider Risk and Insider Threats

Coinbase insider who sold customer data to criminals arrested in India

AI agents 2026's biggest insider threat: PANW security boss • The Register

Insurance

CISOs Face A Tighter Insurance Market in 2026

Supply Chain and Third Parties

Crypto wallet firm Ledger faces new data breach through Global-e partner

Cyber Risk In 2026: How Geopolitics, Supply Chains and Shadow AI Will Test Resilience - Infosecurity Magazine

Cloud/SaaS

Dozens of organizations fall victim to infostealers after failing to enforce MFA | TechRadar

Cloud file-sharing sites targeted for corporate data theft attacks

When the Cloud Rains on Everyone's IoT Parade

Phishers Exploit Office 365 Users Who Let Their Guard Down

Cybercriminals Abuse Google Cloud Email Feature in Multi-Stage Phishing Campaign

Phishing campaign abuses Google Cloud services to steal Microsoft 365 logins | Malwarebytes

Phishing attacks exploit misconfigured emails to target Microsoft 365 - Infosecurity Magazine

Europe’s Cloud Debate Is Looking the Wrong Way: It’s Not Concentration – It’s Lock-In |

Identity and Access Management

Agentic AI Is an Identity Problem and CISOs Will Be Accountable for the Outcome

Identity becomes the 2026 battleground as AI erases trust signals | SC Media

Enterprises still aren’t getting IAM right – Computerworld

Legacy IAM was built for humans — and AI agents now outnumber them 82 to 1 | VentureBeat

Encryption

AI, Quantum, and the New Threat Frontier: What Will Define Cybersecurity in 2026? - Security Boulevard

The U.K.’s Plan for Electronic Eavesdropping Poses Cybersecurity Risks | Lawfare

Linux and Open Source

GoBruteforcer Botnet Targets Linux Servers - Infosecurity Magazine

Passwords, Credential Stuffing & Brute Force Attacks

Infostealers Enable Attackers to Hijack Legitimate Business Infrastructure for Malware Hosting

Phishing campaign abuses Google Cloud services to steal Microsoft 365 logins | Malwarebytes

Cryptocurrency theft attacks traced to 2022 LastPass breach

HSBC blocks app users for having sideloaded password manager • The Register

Palo Alto crosswalks hacked due to unchanged default passwords - Boing Boing

Social Media

I Talked to Cybersecurity Experts After These LinkedIn Scams Almost Fooled Me - CNET

BBC Bitesize Launches Media Literacy Series To Help Teens Separate Fact From Fiction Online - IT Security Guru

Regulations, Fines and Legislation

The U.K.’s Plan for Electronic Eavesdropping Poses Cybersecurity Risks | Lawfare

EU plans new AI data rules, privacy at risk| Cybernews

Europe looks to AI resilience amid growing risk

Trump admin lifts sanctions on Predator-linked spyware execs • The Register

Uk Government's Digital ID plan is a ‘huge new cyber risk’ say Tories

Cyber security Bill will introduce mandatory digital ID by stealth, say Tories | Morning Star

Age verification changed the internet in 2025 – here's what it means for your privacy in 2026 | TechRadar

Cybersecurity Act review: What to expect | Epthinktank | European Parliament

Trump pulls US out of international cyber orgs | CyberScoop

US To Leave Global Forum on Cyber Expertise - Infosecurity Magazine

Billion-dollar Bitcoin hacker Ilya Lichtenstein thanks Trump for early prison release | The Verge

China moves to rein in 'anthropomorphic' AI chatbots

Government demands Musk's X deals with 'appalling' Grok AI - BBC News

FCC finalizes new penalties for robocall violators | CyberScoop

Time to restore America’s cyberspace security system | CyberScoop

Nearly half of UK users watch unverified porn | Cybernews

Models, Frameworks and Standards

Uk Government's Digital ID plan is a ‘huge new cyber risk’ say Tories

Cyber security Bill will introduce mandatory digital ID by stealth, say Tories | Morning Star

Cyber Security and Resilience (Network and Information Systems) Bill: call for evidence - UK Parliament

Cybersecurity Act review: What to expect | Epthinktank | European Parliament

NIST Releases Preliminary Draft Cyber AI Profile

Careers, Roles, Skills, Working in Cyber and Information Security

Why cybersecurity cannot hire its way through the AI era | CyberScoop

The Pentagon’s short more than 20,000 cyber pros. Veterans could help fill the gap.

Cybersecurity skills matter more than headcount in the AI era | CSO Online

6 strategies for building a high-performance cybersecurity team | CSO Online

Law Enforcement Action and Take Downs

Billion-dollar Bitcoin hacker Ilya Lichtenstein thanks Trump for early prison release | The Verge

Alleged cybercrime kingpin arrested and extradited to China, Cambodia says | CNN

Two cybersecurity experts plead guilty to running ransomware operation | CSO Online

Founder of spyware maker pcTattletale pleads guilty to hacking and advertising surveillance software | TechCrunch

Misinformation, Disinformation and Propaganda

BBC Bitesize Launches Media Literacy Series To Help Teens Separate Fact From Fiction Online - IT Security Guru

US, observers watch for cyber, disinformation campaigns in wake of Venezuela raid - Defense One


Nation State Actors, Advanced Persistent Threats (APTs), Cyber Warfare, Cyber Espionage and Geopolitical Threats/Activity

Cyber Warfare and Cyber Espionage

A rash of Baltic cable-cutting raises fears of sabotage

Russia Builds Underwater Drone Fleet That Could Target NATO Cables and Pipelines — UNITED24 Media

Leak exposes Knownsec’s role in state cyber targeting | Cybernews

Russia-linked APT UAC-0184 uses Viber to spy on Ukrainian military in 2025

What is happening to the Internet in Venezuela?

Nation State Actors

Cyber Risk In 2026: How Geopolitics, Supply Chains and Shadow AI Will Test Resilience - Infosecurity Magazine

Illegal crypto dealings hit $154B amid surge in state-sponsored threats - Chainalysis report - Cryptopolitan

China

Leak exposes Knownsec’s role in state cyber targeting | Cybernews

New China-linked hackers breach telcos using edge device exploits

Hundreds of British buses have Chinese ‘kill switch’

China hits Taiwan with 2.6M cyberattacks a day | Cybernews

Taiwan blames Chinese ‘cyber army’ for rise in millions of daily intrusion attempts | CyberScoop

China-linked groups intensify attacks on Taiwan’s critical infrastructure, NSB warns

China moves to rein in 'anthropomorphic' AI chatbots

China’s New Cybersecurity Law Demands Faster Incident Reporting From Companies - gHacks Tech News

Congressional staff emails hacked as part of Salt Typhoon campaign | TechRadar

Russia

A rash of Baltic cable-cutting raises fears of sabotage

Russia Builds Underwater Drone Fleet That Could Target NATO Cables and Pipelines — UNITED24 Media

ClickFix attack uses fake Windows BSOD screens to push malware

Russia-linked APT UAC-0184 uses Viber to spy on Ukrainian military in 2025

Hackers target Booking.com users | Cybernews

Russian hackers target European hospitality industry with ‘blue screen of death’ malware | The Record from Recorded Future News

Starlink Satellites Might Start Falling Out Of The Sky Due To This New Threat

North Korea

North Korean hackers using QR codes to attack governments and think tanks: FBI | NK News

The Evolution of North Korea – And What To Expect In 2026 | SC Media UK

Other Nation State Actors, Hacktivism, Extremism, Terrorism and Other Geopolitical Threat Intelligence

International Threats: Themes for Regional Phishing Campaigns - Security Boulevard

Cyber Risk In 2026: How Geopolitics, Supply Chains and Shadow AI Will Test Resilience - Infosecurity Magazine

Trump suggests US used cyberattacks to turn off lights in Venezuela during strikes - POLITICO

US Action in Venezuela Provokes Cyberattack Speculation

Trump suggests US used cyberattacks to turn off lights in Venezuela during strikes - POLITICO

What is happening to the Internet in Venezuela?

US, observers watch for cyber, disinformation campaigns in wake of Venezuela raid - Defense One

President Trump Orders Divestment in $2.9 Million Chips Deal to Protect US Security Interests - SecurityWeek

Cyberattacks Likely Part of Military Operation in Venezuela

Critics pan spyware maker NSO's transparency claims amid its push to enter US market | TechCrunch





Sector Specific

Industry specific threat intelligence reports are available.

Contact us to receive tailored reports specific to the industry/sector and geographies you operate in.

·       Automotive

·       Construction

·       Critical National Infrastructure (CNI)

·       Defence & Space

·       Education & Academia

·       Energy & Utilities

·       Estate Agencies

·       Financial Services

·       FinTech

·       Food & Agriculture

·       Gaming & Gambling

·       Government & Public Sector (including Law Enforcement)

·       Health/Medical/Pharma

·       Hotels & Hospitality

·       Insurance

·       Legal

·       Manufacturing

·       Maritime & Shipping

·       Oil, Gas & Mining

·       OT, ICS, IIoT, SCADA & Cyber-Physical Systems

·       Retail & eCommerce

·       Small and Medium Sized Businesses (SMBs)

·       Startups

·       Telecoms

·       Third Sector & Charities

·       Transport & Aviation

·       Web3


Contact us to help assess where your risks lie and to ensure you are doing all you can do to keep you and your business secure.

Look out for our ‘Cyber Tip Tuesday’ video blog and on our YouTube channel.

You can also follow us on Facebook, Twitter and LinkedIn.

Links to external articles are provided for general interest and awareness only. Linking to or reposting external content does not constitute endorsement of or by any organisation, service, or product. We do not control and are not responsible for the content, security, or availability of external websites or links. Full credit is given to the original authors and sources. E&OE.

 

Next
Next

Black Arrow Cyber Threat Intelligence Briefing 02 January 2026